Home > Research > Publications & Outputs > Access-Path Abstraction: Scaling Field-Sensitiv...

Links

Text available via DOI:

View graph of relations

Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T)

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T). / Lerch, Johannes; Späth, Johannes; Bodden, Eric et al.
Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on . Nebraska: IEEE Press, 2015. p. 619-629.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Lerch, J, Späth, J, Bodden, E & Mezini, E 2015, Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T). in Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on . IEEE Press, Nebraska, pp. 619-629. https://doi.org/10.1109/ASE.2015.9

APA

Lerch, J., Späth, J., Bodden, E., & Mezini, E. (2015). Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on (pp. 619-629). IEEE Press. https://doi.org/10.1109/ASE.2015.9

Vancouver

Lerch J, Späth J, Bodden E, Mezini E. Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on . Nebraska: IEEE Press. 2015. p. 619-629 doi: 10.1109/ASE.2015.9

Author

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric et al. / Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T). Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on . Nebraska : IEEE Press, 2015. pp. 619-629

Bibtex

@inproceedings{90f7a9b9c08f4a41a6e40b1f94ed784b,
title = "Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T)",
abstract = "Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be bounded to assure termination, and should anyway be small to enable a scalable analysis. We present Access-Path Abstraction, which for the first time combines efficiency with maximal precision. At control-flow merge points Access-Path Abstraction represents all those access paths that are rooted at the same base variable through this base variable only. The full access paths are reconstructed on demand where required. This makes it unnecessary to bound access paths to a fixed maximal length. Experiments with Stanford SecuriBench and the Java Class Library compare our open-source implementation against a field-based approach and against a field-sensitive approach that uses bounded access paths. The results show that the proposed approach scales as well as a field-based approach, whereas the approach using bounded access paths runs out of memory.",
author = "Johannes Lerch and Johannes Sp{\"a}th and Eric Bodden and Ermira Mezini",
year = "2015",
month = nov,
day = "9",
doi = "10.1109/ASE.2015.9",
language = "English",
isbn = "978150900025815",
pages = "619--629",
booktitle = "Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on",
publisher = "IEEE Press",

}

RIS

TY - GEN

T1 - Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T)

AU - Lerch, Johannes

AU - Späth, Johannes

AU - Bodden, Eric

AU - Mezini, Ermira

PY - 2015/11/9

Y1 - 2015/11/9

N2 - Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be bounded to assure termination, and should anyway be small to enable a scalable analysis. We present Access-Path Abstraction, which for the first time combines efficiency with maximal precision. At control-flow merge points Access-Path Abstraction represents all those access paths that are rooted at the same base variable through this base variable only. The full access paths are reconstructed on demand where required. This makes it unnecessary to bound access paths to a fixed maximal length. Experiments with Stanford SecuriBench and the Java Class Library compare our open-source implementation against a field-based approach and against a field-sensitive approach that uses bounded access paths. The results show that the proposed approach scales as well as a field-based approach, whereas the approach using bounded access paths runs out of memory.

AB - Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be bounded to assure termination, and should anyway be small to enable a scalable analysis. We present Access-Path Abstraction, which for the first time combines efficiency with maximal precision. At control-flow merge points Access-Path Abstraction represents all those access paths that are rooted at the same base variable through this base variable only. The full access paths are reconstructed on demand where required. This makes it unnecessary to bound access paths to a fixed maximal length. Experiments with Stanford SecuriBench and the Java Class Library compare our open-source implementation against a field-based approach and against a field-sensitive approach that uses bounded access paths. The results show that the proposed approach scales as well as a field-based approach, whereas the approach using bounded access paths runs out of memory.

U2 - 10.1109/ASE.2015.9

DO - 10.1109/ASE.2015.9

M3 - Conference contribution/Paper

SN - 978150900025815

SP - 619

EP - 629

BT - Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on

PB - IEEE Press

CY - Nebraska

ER -